- Kprobe - Attach a program to the entry or exit of an arbitrary kernel symbol (function).
- kprobe - Kprobe using bpf2go.
- kprobepin - Reuse a pinned map for the kprobe example. It assumes the BPF FS is mounted at
/sys/fs/bpf
.
- kprobe_percpu - Use a
BPF_MAP_TYPE_PERCPU_ARRAY
map.
- ringbuffer - Use a
BPF_MAP_TYPE_RINGBUF
map.
- Uprobe - Attach a program to the entry or exit of an arbitrary userspace binary symbol (function).
- Tracepoint - Attach a program to predetermined kernel tracepoints.
- Cgroup - Attach a program to control groups (cgroups).
- cgroup_skb - Count packets egressing the current cgroup.
- Fentry - Attach a program to the entrypoint of a kernel function.
Like kprobes, but with better performance and usability, for kernels 5.5 and later.
- tcp_connect - Trace outgoing IPv4 TCP connections.
- tcp_close - Log RTT of IPv4 TCP connections using eBPF CO-RE helpers.
- Add your use case(s) here!
cd ebpf/examples/
go run -exec sudo [./kprobe, ./uretprobe, ./ringbuffer, ...]